Practical Threat Detection Engineering by Megan Roddie Jason Deyalsingh Gary J. Katz
Author:Megan Roddie, Jason Deyalsingh, Gary J. Katz
Language: eng
Format: epub
Publisher: Packt Publishng Pvt Ptd
Published: 2023-06-27T00:00:00+00:00
One plainly wrong approach would be to build a detection that looks for exact matches for all the event attributes. The reason this wonât work is that we expect certain attributes to change. The event time will almost always be different, and since we want to be able to detect events on multiple systems, the system name cannot be part of the definition. Inversely, if we develop a rule that only relies on Event Type = File Execution, then we will likely capture every execution of evil.exe, but also the execution of many other files that do not have the name evil.exe.
Since attributes can change for events representing the same underlying activity, the rules we develop need to be similarly tuned to account for these changes. If rules are too tightly defined, they will likely not match every occurrence of the event; if rules are too loosely defined, they will generate false positives. A safe goal is to write a rule that minimizes false positives. Letâs take a look at how the telemetry changes when using different tools that are functionally similar to PsExec in order to identify which fields will remain consistent.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(4812)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(4542)
Machine Learning Security Principles by John Paul Mueller(4525)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(4203)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(4189)
Future Crimes by Marc Goodman(3157)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3156)
Mastering Python for Networking and Security by José Manuel Ortega(3147)
Solidity Programming Essentials by Ritesh Modi(3083)
Blockchain Basics by Daniel Drescher(3079)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(2746)
Mobile App Reverse Engineering by Abhinav Mishra(2730)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(2687)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2670)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2617)
The Code Book by Simon Singh(2473)
The Art Of Deception by Kevin Mitnick(2432)
Learn Computer Forensics - Second Edition by William Oettinger(2256)
Incident Response with Threat Intelligence by Roberto Martínez(2202)